Second Term Yr 9 Lesson Note
Second Term Yr 9 Lesson Note
CONTENT OF SPREADSHEET
When you are setting out a spreadsheet, you have to enter values, labels and formulas.
• VALUES: Values are those numbers you already know before starting the spreadsheet
operation. These values are inserted into cells of the spreadsheet.
• LABELS: Labels are words you enter to explain the values. You would not just enter a
list of numbers without explanation. Putting labels next to each of the numbers makes it
easier to check it through.
• FORMULA: Formulas are the mathematical equations you insert into the cells. Formulas are
commands that instruct the computer on what to do.
EVALUATION
1. Define a worksheet.
2. What do you understand by cell
reference?
USES OF SPREADSHEET
There are various uses of a spreadsheet. It uses varies according to the intended purpose.
Some of its uses are as follows:
1. Spreadsheets are used for administrative functions.
2. Spreadsheets are used for creating reports.
3. They are used for the preparation of daily sales.
4. They are used in computing school results.
5. They are used for project budgeting control.
6. They are used for drawing balance sheets.
7. Excel can store and calculate the data as directed using existing
data.
8. A spreadsheet can be used for analysis and decision making.
9. It makes calculations much easier than working things out yourself.
EXAMPLES OF SPREADSHEET
There are various types of spreadsheet software which
include:
• Microsoft excel
• Lotus 1-2-3,
• Starview,
• SuperCalc, etc.
MICROSOFT-EXCEL
Out of the many examples of spreadsheet
packages, Microsoft Excel is the most
commonly used because of its friendly
features. Microsoft Excel is part of
Microsoft suite. The suite comes in various
version such as 2000, 2005, 2007,2010,
2015 etc.
Ms-Excel is primarily used for analysis and
calculation due to its flexibility. It has a lot of calculating features and mathematical formulas.
Various kinds of mathematical calculations can be done using MS excel. Microsoft Excel is a
spreadsheet package used mainly for mathematical calculations and numerical analysis.
Examples of
calculations that can be performed using MS Excel include; addition, subtraction, multiplication,
division, average, etc.
Formulas are often used to carry out calculations in Ms-Excel. The desired formula for any
calculation must be preceded with an equal sign (=).
Row
Column
Cell
Active Cell
Worksheets
Workbook
Chart
Data Range
Fill handle
Moving
border
Rows
A Row is a horizontal line of cells which runs from left to right in a worksheet. They can be
identified by the numbers at the left-hand-side of the work sheet. They are numbered from 1, 2,
3 to 1,048,576 in Excel 2007, 2010, 2013 & 2016.
Columns
A Column is a vertical line of cells in a worksheet usually identified by letters across the top of
the sheet. There are about 16,384 columns in Excel 2007, 2010, 2013 & 2016.
Cells
A Cell
is the
interse
ction
of a
row
The
and aActive Cell
colum
The active cell is the cell that contains the cell pointer, while the active worksheet is
n. The
the worksheet where the cell pointer is currently located.
highlig
hted
rectan
gle on
Worksheet
the
cell is
the
The worksheet (also known as spreadsheet) is the working area of the package where entering of
data and calculations are handled. It consists of rows, columns, cells and a cell pointer where
data are actually entered and manipulated.
Workbook
This can be simply defined as a collection of worksheets. Each workbook contains
many worksheets just like a normal single book with a number of pages.
Chart
A Chart is a graphical representation of data that enables you to understand the data at a
glance. Examples of Charts include Column (histogram), Pie chart, Bar Chart, Line Chart,
Surface, Doughnut, etc.
Data Range
A group of highlighted cells in a worksheet is referred to as a Range.
Fill Handle
This is a small black square at the corner of selected cells. The cursor changes to a black
cross when moved to it.
Moving Border
This is an animated border that appears around a selected cell that has been cut or copied.
Press the ESC key to cancel a moving border.
STARTING MS EXCEL
Starting Worksheet (Using Microsoft Excel) Click the Start
button;
Click All Programs; Click Microsoft Office;
Click Microsoft Office Excel.
EVALUATION
1. Highlight the steps for starting Ms-Excel.
2. What are the types of calculations that can be performed in Ms-
Excel?
When creating a formula, you must know MS Excel’s order of operations. Certain operations are
performed before others. The term PEMDAS is the acronym to denote
MS Excel’s order of operation.
P —— Parenthesis (Bracket)
E —– Exponential
M —– Multiplication
D —– Division
A —– Addition
S —— Subtraction
Calculations enclosed in parenthesis are performed first, followed by calculations involving
exponentials. Multiplication and division operations are performed next because they are
considered equal in importance. They are performed in the order in which they are encountered
from left to right. Addition and subtraction are performed last in the order in which they are
encountered from left to right.
Formulas in MS Excel
Examples: Addition =C3+D3
Subtraction =C3-D3
Division =C3/D3
Multiplication =C3*D3
Average =AVERAGE(C4…C9)
GENERAL EVALUATION
1. In the right order, list the order of calculation operations in Excel.
2. Apart from MS-Excel, list two other types of Spreadsheet packages.
3. Write the full meaning of the acronyms PEMDAS.
4. List two formulas in Ms-Excel.
TOPIC: WORKSHEET
Worksheet commonly refers to a sheet of paper with questions for
students and places to record answers. The term may also refer to
a single array of data in spreadsheet software or an informal piece
of paper that an accountant uses to record information.
A worksheet or sheet is a single page in a file created with an
electronic spreadsheet program such as Excel or Google
Spreadsheets. A worksheet is used to store, manipulate, and
display data. A worksheet is a collection of cells where you keep
and manipulate the data. By default, each Excel workbook
contains three worksheets.
Each worksheet is composed of a very large number of cells –
which are the basic storage unit for data in a file or workbook. The
cells are arranged in a grid pattern using rows and columns.
In Excel 2013:
There are
1,048,576 rows per worksheet;
There are
16,384 columns per worksheet;
By default, each new file contains only one worksheet;
The number of sheets per file is limited only by the amount of
memory available on the computer.
In earlier versions of Excel, the default number of worksheets per
file was three.
For Google Spreadsheets:
There is a maximum of 256 columns per sheet;
Each worksheet also has a name. TheBy default, the
maximum worksheets
number of cells are named Sheet1, Sheet2, Sheet3
for all
and so on.
worksheets in a file is 400,000;
The current default number of
worksheets for new files is one;
There is a maximum of 200 worksheets per spreadsheet file.
Type in your entry from the keyboard and notice the appearance of the entries in the formula bar
with the cell address. Press ‘Enter’ key.
EVALUATION
1. What are the steps involved in creating a
Spreadsheet?
2. Explain how to enter data into Excel.
Navigate to the file you want to open and double click on it.
GENERAL EVALUATION
1. Define a cell.
2. State steps involved in saving a worksheet for the first
time.
3. Highlight the steps in retrieving a saved document.
Average
It is also possible to use the spreadsheet package to find the average of certain values or
group of numbers. To find average:
Position the cell pointer in the desired cell where result is to be displayed
Type “=AVERAGE (DATA RANGE)”in the formula bar
Press the ENTER KEY
The result is displayed in the cell
Count
The COUNT function is used to ascertain the number of cells within a specified range
that contains values. To use the count function;
Position the cell pointer in the desired cell
Click on AutoSum (S) and select “Count”
Press the ENTER KEY.
Multiplication
The multiplication function is solely for multiplication of numbers just like in arithmetic. To
multiply a range of data;
Position the cell pointer on the desired cell i.e. the cell where the result should be
displayed.
Type equal sign, Select the function (i.e. PRODUCT) and state the range of cells.
MS Excel will highlight the range specified.
Press the Enter key.
The result is displayed.
Also, the symbol (*) can be used.
Division
To divide a range of values;
Position the cell pointer on the desired cell i.e. the cell where the result should be displayed.
Type equal sign, Select the function (i.e. QUOTIENT to display the integer portion of a
division) and state the range of cells.
MS Excel will highlight the range specified.
Press the Enter key.
The result is displayed.
Also, the symbol (/) can be used to display the exact result.
Printing of Worksheet
After the spreadsheet have been formatted and properly calculated the next thing is to get
the worksheet printed. To print your worksheet, take the following steps:
Highlight the range to be printed
Click on the Office button and select Print
Select the name of the printer from the Printer Name box
Enter the number of copies to print
Click on Preview button and select Page Set Up. Set all the necessary parameters like
margins, page layout, paper size and grid lines (if necessary).
Click on OK
Click on
EVALUATION
State THREE guidelines that must be followed when performing excel calculations
Highlight the major steps required to carry out the following calculations: (a) Addition
(b)
Subtraction (c) Count (d) Average (e) Division
Summary Note for Year 9, Week Five: Creative and Editing Graphs
A graph is a diagram showing the relationship that exist among variables, quantities (varies
data), usually of two, each measured along one of a pair of axes at right angles. It may not be
possible
to plot a graph without value. The excel spreadsheet provides the values that are plotted.
Creating a Graph
Charts are used to display a series of numeric data in a graphical format to make it easier
to understand large quantities of data and the relationship between different series of data.
To create a chart in Excel, you start by entering the numeric data for the chart on a
worksheet. Then you can plot that data into a chart by selecting the chart type that you
want to use on the Insert tab, in the Charts group.
1. Worksheet data
2. Chart created from worksheet data
Excel supports many types of charts to help you display data in ways that are meaningful to your
audience. When you create a chart or change an existing chart, you can select from a variety of
chart types (such as a column chart or a pie chart) and their subtypes (such as a stacked
column chart or a pie in the 3-D chart). You can also create a combination chart by using more
than one
chart type in your chart.
Example of a combination chart that uses a column and line chart type.
Types of Chart
Line graph
Histograms
Pie-charts
Legends
Line Graph
Line graphs are often used to plot changes in data over time, such as monthly temperature
changes or daily changes in stock market prices. Line graphs have a vertical axis and a
horizontal axis. If you are plotting changes in data over time, time is plotted along the horizontal
or x-axis
and your other data, such as rainfall amounts is plotted as individual points along the vertical or
y- axis.
Histograms
A histogram
consists of
tabular
frequencies,
shown as
Pie Charts and Legends
adjacent
rectangles,
erected over
Pie Charts
discrete
intervals
Pie charts,(bins),
or circle graphs as they are sometimes known, are a little different from the other two
with
types ofangraphs
areadiscussed.
equal to the
For one, pie charts do not use horizontal and vertical axes to plot points like the others. They
frequency of
also differ in that they are used to chart only one variable at a time. As a result, it can only be
the
used to show percentages. The circle of pie charts represents 100%. The circle is subdivided
observations in
into slices representing data values. The size of each slice shows what part of the 100% it
the interval.
represents.
The height of a
Legends
rectangle is
A legend
also is used
equal to to identify each series in a chart. It contains on sample of the marker colour and
patternfrequency
the of each series.
density
Modify a ofbasicthechart to meet your needs
interval.
After you create a chart, you can modify any one of its elements. For example, you might want
to change the way that axes are displayed, add a chart title, move or hide the legend, or display
additional chart elements. To modify a chart, you can do one or more of the following:
Change the display of chart axes: You can specify the scale of axes and adjust the interval
between the values or categories that are displayed. To make your chart easier to read, you can
also add tick marks to an axis, and specify the interval at which they will appear.
Add titles and data labels to a chart: To help clarify the information that appears in your chart,
you can add a chart title, axis titles, and data labels.
Add a legend or data table: You can show or hide a legend, change its location, or modify the
legend entries. In some charts, you can also show a data table that displays the legend keys
and the values that are presented in the chart.
Apply special options for each chart type: Special lines (such as high-low lines and trend lines),
bars (such as up- down bars and error bars), data markers, and other options are available for
different chart types.
EVALUATION
1. State the steps to modify a chart
Summary Note for Year 9, Week Six: Formatting graphs
After creating a chart, you can change it to the type you want. The type you choose depends on
how you want to present your data.
Adding or removing more data point to the existing chart data series.
Formatting a Chart
You can change the font of chart text, change the horizontal and vertical alignment and rotate text
to a vertical orientation. You can also change the pattern and the colour of the text area. The text
is displayed in the front of the area pattern so that it is always visible. Microsoft Excel
automatically formats the charts title and axes title as bold.
To format all the text in a chart, select the chart by choosing select chart from the chart menu. To
format a single piece of attached or unattached text, click the text to select it. To format tick-
mark labels for an axis, click the axis to select it.
To format text that appears in a legend, click the legend; click the legend to select it.
Physical Intrusion: This kind of intrusion happens when an intruder has physical access to the
target machine. This might allow the intruder to gain full control of the system – for example
by booting with a special floppy or by taking the system apart physically (e.g. removing the
Hard- drive to another system owned by the attacker, which then enables him/her to
read/write to it).
System Intrusion: In this case, it is assumed that the intruder has already got low-level privileges
on the system. They then exploit unpatched security vulnerabilities in order to escalate their
privileges to the administrative level.
Remote Intrusion: With remote intrusion, an attacker tries to get into the system remotely through
the network. They initially do not have any privileges to the system, but one way or another –
e.g. by finding out some valid account names and cracking their (usually weak) password, or by
exploiting common security vulnerabilities (buffer overflow, etc.) – they manage to get in and
obtain root access.
Remote intrusion is the most common type of attack associated with hackers. Nevertheless,
there are some cases of system intrusion, for example, the insider attack, where a
legitimate user (could be a disgruntled or former employee) performs an attack due to
various reasons (revenge, cyber-espionage, etc.).
In order to minimize intrusion, many organizations install Intrusion Detection Systems (IDS).
Such a system inspects inbound and outbound network activity and identifies suspicious
patterns that may indicate a network or system attack from someone attempting to break into or
compromise a system. There are many IDSs available. Most of these are commercial software
and are primarily concerned with remote intrusions. We will not discuss IDS in great detail in this
paper since our focus is on the attackers along with their hacking activities and some insights
into their human aspects.
TYPES OF ATTACKS
Attackers can cause various levels of damage, depending on their skill level and/or their
motives. There is a common pattern though: they usually follow a similar set of steps of
information gathering before launching the attack.
Foot Printing: The aim of this activity is to obtain a complete profile of the target organization’s
network and its security arrangement. The information of interest includes the technology that
the organization is using (e.g. Internet, Intranet, Remote Access, and Extranet) and its security
policies and procedures. Although there are many different methods attackers can use to
perform footprinting, there are four general steps that they are likely to follow: − Determine the
scope of the footprinting activities. In some cases, it might be a bit too much to determine all
entities associated with a Target organization. Therefore attackers often need to narrow down
the scope of their Footprinting activities.
Social Engineering: Social Engineering is the term used to describe cracking techniques that
rely
on weaknesses in wetware (i.e. human users attached to the system – administrators,
operators, etc.) rather than software. The aim is to trick people into revealing passwords or other
information that compromises a target system’s security.
Software Bugs: Another way to get into a system is through security vulnerabilities brought by
bugs in the software (operating system, server daemons, client applications, etc.). It is almost
impossible to have bug-free software and the attackers only need to find one hole in order to
break in. As a result, the program may crash and very often; this gives the attackers root
access and/or allows them to run any arbitrary code. Attackers can find buffer overflow bugs
by:
1. browsing the web for known buffer overflow vulnerabilities on certain programs;
2. Searching for these bugs in the program directly if the source code is available;
3. Examining every place the program prompts for input and trying to overflow it with random
(massive) data. If the program crashes, there is a chance that by carefully constructing the
input, access to the system can be obtained.
EVALUATION
1. Briefly explain the 3 main ways to intrude into a
system
2. State the types of attacks
OR GATE
The OR gate gets its name from the fact that it behaves after the fashion of the logical inclusive
“or.” The output is “true” if either or both of the inputs are “true.” If both inputs are “false,” then
the output is “false.”
XOR GATE
The XOR (exclusive-OR ) gate acts in the same way as the logical “either/or.” The output is
“true” if either, but not both, of the inputs, are “true.” The output is “false” if both inputs are “false”
or if both inputs are “true.” Another way of looking at this circuit is to observe that the output is 1
if the inputs are different, but 0 if the inputs are the same.
NAND GATE
The NAND gate operates as an AND gate followed by a NOT gate. It acts in the manner of
the logical operation “and” followed by negation. The output is “false” if both inputs are “true.”
Otherwise, the output is “true.”
NOR GATE
The NOR gate is a combination OR gate followed by an inverter. Its output is “true” if both
inputs
are “false.” Otherwise, the output is “false.”
XNOR Gate
The XNOR gate is a combination inverter / NOT gate followed by an XOR gate. Its output is
“true”
if both inputs are “false.” Otherwise, the output is “false.”
Using combinations of logic gates, complex operations can be performed. In theory, there is no
limit to the number of gates that can be arrayed together in a single device. But in practice,
there is a limit to the number of gates that can be packed into a given physical space. Arrays of
logic gates are found in digital integrated circuits (ICs). As IC technology advances, the required
physical volume for each individual logic gate decreases and digital devices of the same or
smaller size become capable of performing ever-more-complicated operations at ever-
increasing speeds.
Database administrator – Takes overall responsibility for the usage, accuracy, efficiency,
security, maintenance of an organization’s database systems. Coordinates development
and
use of data resources.
Systems administrator – Responsible for managing the operation of a multi-user computer
system or network so that it runs reliably and meets user’s needs; updates and configures
software and hardware; provides assistance to users and managers.
Computer security specialist – Protects computer systems from illegal intrusions, viruses, data
theft, fraud, or other forms of tampering.
Management/IT consultants – Uses problem-solving skills and computer knowledge to solve
business and management problems for organizations and foster improvement in areas such as
organization structure, business communication, and productivity. Defines and analyzes the
problem, interviews potential employees, develops possible solutions and presents options to the
client.
Chief information officer (CIO) – Serves as the highest information services executive for a major
corporation. Responsible for long-term planning and setting organization-wide policy and
standards relating to all computer-related activities.
Network administrator
Takes overall responsibility for the operation and planning for a local or wide-area
computer network. Plans expansion; selects appropriate network operating system and
software tools; configures major features; deals with the connection between local network
and Internet; establish procedures for support staff and users.
Internet consultant
Uses some combination of analysis, design, programming, and support skills to help clients
with the design of Internet sites and configuration of Internet software and connections.
Webmaster
Creates or
maintains a
Web site.
Provides
content and
programming or
Graphics and Multimedia
supervises
writers and
programmers.
Animation/Special
Monitors the effects developer
Develops software programs for creating sequences of computer images for games or
performance
movies.
and popularity
of the site.
Provides secure
Multimedia
forms anddeveloper
transactions
Uses for programming skills to create interactive multimedia products that
design and
Internet-based
combine sound, images, and text.
businesses.
CERTIFICATE: This is the process of verifying the technical knowledge of an individual who has
demonstrated competence in a particular area, today there are more than 200 certificates
available, such as.
EVALUATION
1. Briefly explain the career opportunities of computer science
graduates
PROGRAMMER/SOFTWARE ENGINEER
Good computer programmer must be able to give instruction to the
computer.
Use of computer programming language to develop programs.
Ability to develop a good and durable program.
Must be able to detect or debug a problem in a program.
COMPUTER INSTRUCTOR/EDUCATOR
Teaches and trains people on the use, misuse and care of computer
Impacts knowledge into computer illiterates
Good knowledge of computer and effective operation
COMPUTER TECHNICIANS
Good computer technician repairs computer
Assembles computer parts
Troubles shooting of Computer problems
Computer hardware maintenance and repair
COMPUTER OPERATOR
Fast typing skills.
Use of graphics package for design
Excellent use of computer for
documents
The effective operation of the Computer
EVALUATION
1. State some of the qualities needed to be most successful in the computer and IT
world
2. State general qualities of a good Computer Professional